Popis: |
Privacy protection is an essential section of information security. The use of shared resources demands more privacy and security protection, especially in cloud computing environments. The aim of side-channel attacks is to extract secrets from systems. This can be through measurement and analysis of physical parameters. Execution time, electromagnetic emission, and supply current are some examples of such parameters. A side-channel attack does not target a program or its code directly. Instead, a side-channel attack attempts to gather information or influence the program execution of a system by measuring or exploiting the indirect effects of the system or its hardware. Put simply, a side-channel attack breaks cryptography by exploiting information inadvertently leaked by a system. The modules with integrated cryptographic systems pose a serious threat to these attacks. It has been observed that many robust algorithmic cryptographic operations have been broken successfully by side-channel analysis techniques. In this paper, the aim is to present a comparative review of the various side channel attacks possible and their countermeasures. Also, a new approach is proposed to prevent side-channel attacks and enhance the security of the entire network. The primary objective of this survey is to provide researchers in the field of side-channel attack a comprehensive summary of the progress achieved so far and to facilitate them to identify a few challenging future research areas. |